Preferred Language
Articles
/
dxcHOI8BVTCNdQwCBWNa
Multi-Objective Evolutionary Algorithm Based on Decomposition for Energy Efficient Coverage in Wireless Sensor Networks
...Show More Authors

Scopus Clarivate Crossref
Publication Date
Sun Sep 15 2024
Journal Name
Iraqi Journal Of Pharmaceutical Sciences( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and In vitro/Ex vivo Evaluation of Nanoemulsion-Based in Situ Gel for Intranasal Delivery of Lasmiditan
...Show More Authors

Lasmiditan (LAS) was formulated as a nanoemulsion based in situ gel (NEIG)with the aim of improving its oral bioavailability via application intranasally. The solubility of LAS in oils, emulsifiers, and co-emulsifiers was determined to identify nanoemulsion (NE)components. Phase diagrams were constructed to identify the area of nanoemulsification. LAS NE was formulated using the spontaneous nanoemulsification method. Four NEs (F19, F24, F31, and F34) containing 7-15 % oleic acid (OA) as an oily phase, 40-55% labrasol (LR), and transcutol (TC) as emulsifier mixture at (1:1), (2:1), (3:1), and (1:2) ratio with 30-53 % (w/w) aqueous phase, having suitable optical transparency of 95–98%, globule size of 104-140 nm and polydisper

... Show More
View Publication
Scopus (8)
Crossref (6)
Scopus Crossref
Publication Date
Thu Oct 03 2024
Journal Name
Phi Delta Kappan
Literacy-based instruction in STEM
...Show More Authors

Socio-scientific issues provide a great platform to both engage students in scientific topics and assess their understanding of scientific concepts. Nancy R. Singer, Amy Lannin, Maha Kareem, William Romine, and Katie Kline report on the STEM Literacy Project, a three-year National Science Foundation grant that aimed to improve STEM teachers’ knowledge and integration of literacy in their classrooms. They describe teachers’ professional learning, scenario-based assessments and other strategies they incorporated in their STEM classrooms, and how writing enables students to understand real-world issues.

View Publication
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Carbon Nanoparticles Synthesis By Different Nd:Yag Laser Pulse Energy
...Show More Authors

One of the most important techniques for preparing nanoparticle material is Pulsed Laser Ablation in Liquid technique (PLAL). Carbon nanoparticles were prepared using PLAL, and the carbon target was immersed in Ultrapure water (UPW) then irradiated with Q-switched Nd:YAG laser (1064 nm) and six ns pulse duration. In this process, an Nd:YAG laser beam was focused near the carbon surface. Nanoparticles synthesized using laser irradiation were studied by observing the effects of varying incident laser pulse intensities (250, 500, 750, 1000) mJ on the particle size (20.52, 36.97, 48.72, and 61.53) nm, respectively. In addition, nanoparticles were characterized by means of the Atomic Force Microscopy (AFM) test, pH easurement

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Feb 28 2017
Journal Name
Journal Of Engineering
Design and Implementation of Enhanced Smart Energy Metering System
...Show More Authors

In this work, the design and implementation of a smart energy metering system has been developed. This system consists of two parts: billing center and a set of distributed smart energy meters. The function of smart energy meter is measuring and calculating the cost of consumed energy according to a multi-tariff scheme. This can be effectively solving the problem of stressing the electrical grid and rising consumer awareness. Moreover, smart energy meter decreases technical losses by improving power factor. The function of the billing center is to issue a consumer bill and contributes in locating the irregularities on the electrical grid (non-technical losses). Moreover, it sends the switch off command in case of the consumer bill is not

... Show More
View Publication Preview PDF
Publication Date
Fri Feb 17 2012
Journal Name
Smart Materials And Structures
Frequency tuning of piezoelectric energy harvesters by magnetic force
...Show More Authors

View Publication
Scopus (110)
Crossref (100)
Scopus Clarivate Crossref
Publication Date
Wed Mar 01 2023
Journal Name
Baghdad Science Journal
Quotient Energy of Zero Divisor Graphs And Identity Graphs
...Show More Authors

Consider the (p,q) simple connected graph . The sum absolute values of the spectrum of quotient matrix of a graph  make up the graph's quotient energy. The objective of this study is to examine the quotient energy of identity graphs and zero-divisor graphs  of commutative rings using group theory, graph theory, and applications. In this study, the identity graphs  derived from the group  and a few classes of zero-divisor graphs  of the commutative ring R are examined.

View Publication Preview PDF
Scopus (5)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Thu Aug 31 2017
Journal Name
Journal Of Engineering
Energy Analysis of Solar Collector With perforated Absorber Plate
...Show More Authors

The thermal performance of three solar collectors with 3, 6 mm and without perforation absorber plate was assessed experimentally. The experimental tests were implemented in Baghdad during the January and February 2017. Five values of airflow rates range between 0.01 – 0.1 m3/s were used through the test with a constant airflow rate during the test day. The variation of the following parameters air temperature difference, useful energy, absorber plate temperature, and collector efficiency was recorded every 15 minutes. The experimental data reports that the increases  the number of absorber plate perforations with a small diameter is more efficient rather than increasing the hole diameter of the absorber plate with decr

... Show More
View Publication Preview PDF
Publication Date
Wed Jan 01 2014
Journal Name
Scienceasia
A combined compact genetic algorithm and local search method for optimizing the ARMA(1,1) model of a likelihood estimator
...Show More Authors

In this paper, a compact genetic algorithm (CGA) is enhanced by integrating its selection strategy with a steepest descent algorithm (SDA) as a local search method to give I-CGA-SDA. This system is an attempt to avoid the large CPU time and computational complexity of the standard genetic algorithm. Here, CGA dramatically reduces the number of bits required to store the population and has a faster convergence. Consequently, this integrated system is used to optimize the maximum likelihood function lnL(φ1, θ1) of the mixed model. Simulation results based on MSE were compared with those obtained from the SDA and showed that the hybrid genetic algorithm (HGA) and I-CGA-SDA can give a good estimator of (φ1, θ1) for the ARMA(1,1) model. Anot

... Show More
View Publication
Scopus (3)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Wed Feb 29 2012
Journal Name
Al-khwarizmi Engineering Journal
A New Audio Steganography System Based on Auto-Key Generator
...Show More Authors

Stenography is the art of hiding the very presence of communication by embedding secret message into innocuous looking cover document, such as digital image, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information as covers or carriers to hide secret messages.

In this paper, a new Least Significant Bit (LSB) nonsequential embedding technique in wave audio files is introduced. To support the immunity of proposed hiding system, and in order to recover some weak aspect inherent with the pure implementation of stego-systems, some auxiliary processes were suggested and investigated including the use of hidden text jumping process and stream ciphering algorithm. Besides, the suggested

... Show More
View Publication Preview PDF
Publication Date
Tue Aug 24 2021
Journal Name
Conference: The 5th International Multi-conference On Artificial Intelligence Technology (mcait 2021).
Text Encryption Based on DNA Cryptography, RNA, and Amino Acid
...Show More Authors

To achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN

... Show More